Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,734 Article Results

A Discrete Delay N-decomposition Approach for Delay-Dependent Stability of Generator Excitation Control System with Constant Communication Delays

10.11591/ijra.v6i4.pp234-240
S. Manikandan , Priyanka Kokil
This paper deals with problem of delay in stability analysis of network controlled generator excitation system. Delays exist in communication channel in network based control between system and controller. A discrete delay N-decomposition is used to compute delay margin for generator excitation system with constant delay which is easier when compared to analytical method. A Lyapunov krasovskii function is constructed for given time delay generator excitation system and linear matrix inequalities techniques are used. Generator excitation system is employed with proportional integral controller, delay margin calculated for various values of gain of proportional integral controller. Theoretically obtained results are verified using simulation studies.
Volume: 6
Issue: 4
Page: 234-240
Publish at: 2017-12-01

An Agent Architecture for Qos-Based Web Service Composition Using the Skyline Algorithm

10.11591/ijict.v6i3.pp179-188
El-Alami Ayoub , Hair Abdellatif
Web service composition is a concept based on the built of an abstract process, by combining multiple existing class instances, where during the execution, each service class is replaced by a concrete service, selected from several web service candidates. This approach has as an advantage generating flexible and low coupling applications, based on its conception on many elementary modules available on the web. The process of service selection during the composition is based on several axes, one of these axes is the QoS-based web service selection. The Qos or Quality of Service represent a set of parameters that characterize the non-functional web service aspect (execution time, cost, etc...). The composition of web services based on Qos, is the process which allows the selection of the web services that fulfill the user need, based on its qualities. Selected services should optimize the global QoS of the composed process, while satisfying all the constraints specified by the client in all QoS parameters. In this paper, we propose an approach based on the concept of agent system and Skyline approach to effectively select services for composition, and reducing the number of candidate services to be generated and considered in treatment. To evaluate our approach experimentally, we use a several random datasets of services with random values of qualities.
Volume: 6
Issue: 3
Page: 179-188
Publish at: 2017-12-01

Efficacy of GWO Optimized PI and Lead-lag Controller for Design of UPFC based Supplementary Damping Controller

10.11591/ijra.v6i4.pp241-251
Narayan Nahak , Ranjan Kumar Mallick
On line tuning of FACTS based damping controller is a vital decisive task in power system. In this regard two things need to be addressed, one is selection of a proper controller and another one is selection of a powerful optimization technique. In this work Grey Wolf Optimizer (GWO) technique is proposed to tune parameters of PI and lead lag controller based on UPFC to damp intra plant and inter area electromechanical oscillations with single and multi machine power system. A broad comparison has been performed with eigen value analysis between optimized PI and lead lag damping controller subject to different disturbances in power system. The recently revealed GWO, standard PSO and DE techniques are explicitly employed to tune UPFC based PI and lead-lag controller parameters. The system response predicts that performance of GWO is much better than PSO and DE techniques, and also lead lag controller is a better choice than PI controller pertaining to design of UPFC based damping controller.
Volume: 6
Issue: 4
Page: 241-251
Publish at: 2017-12-01

NFC Secured Offline Password Storage

10.11591/ijeecs.v8.i3.pp730-732
Senthil Kumar , V. Mathivanan
In this paper is all about constructing a device called “One-WORD” that aims to solve this problem. One-word is an offline password keeper aimed at saving and encrypting the passwords in a more secure manner. The main device contains the encrypted passwords while a secure NFC smartcard and a personal pin-code allows the decryption. Even if an attacker is able to get hold the smartcard, or the device it is completely useless without the personal code. 
Volume: 8
Issue: 3
Page: 730-732
Publish at: 2017-12-01

Simulation Analysis for Consistent Path Identification to Refine the Network Lifetime

10.11591/ijeecs.v8.i3.pp674-678
G. Vennila
As the demand for Mobile Ad hoc Network (MANET) applications grows, so does their use of many essential services where node consistent and stability of the communication paths are of great importance. In this scheme, we propose Simulation Analysis for Consistent Path Identification to Refine the Network Lifetime (CPIR). This technique offers more stable path and transmits the data through the consistent nodes. This article is focused on protecting the route from the inconsistent node in mobile communications to improve the network performance and reduce the energy consumption in the network. The simulation results demonstrate that CPIR provided reduce the energy utilization and improved both the longer lifetimes and increased number of packets delivered.
Volume: 8
Issue: 3
Page: 674-678
Publish at: 2017-12-01

The Learning Syntax Through Edmodo in the Beginners Class

10.11591/ijere.v6i4.10773
Sugito Sugito , Sri Mulyani Endang Susilowati , Hartono Hartono , Supartono Supartono
Integrating ICT (Information and Communications Technology) in the learning process is a necessity for a teacher in welcoming the 21st century. Knowledge and modern technology require teachers to learn how to use the technology in their teaching. Edmodo application is a very useful technology product in the learning process. Successful use of Edmodo applications in learning is influenced by: (1) teacher factors that include education, length of teaching, age, gender, frequent training, openness of teachers in accessing information, teaching places (city or village), and participation in the organization teachers and pedagogic competencies of educators in delivering materials, (2) facilities and infrastructure factors: building, room, hardware, software, internet connection, infrastructure to school, and instruction on using Edmodo application (3) learner factors that include motivation, courage to explore using Edmodo, and frequency of use of Edmodo app.
Volume: 6
Issue: 4
Page: 299-305
Publish at: 2017-12-01

Identifying the Optimal Controller Strategy for DC Motors

10.11591/ijra.v6i4.pp252-268
M. R. Qader
The aim of this study is to design a control strategy for the angular rate (speed) of a DC motor by varying the terminal voltage. This paper describes various designs for the control of direct current (DC) motors. We derive a transfer function for the system and connect it to a controller as feedback, taking the applied voltage as the system input and the angular velocity as the output. Different strategies combining proportional, integral, and derivative controllers along with phase lag compensators and lead integral compensators are investigated alongside the linear quadratic regulator. For each controller transfer function, the step response, root locus, and bode plot are analysed to ascertain the behaviour of the system, and the results are compared to identify the optimal strategy. It is found that the linear quadratic controller provides the best overall performance in terms of steady-state error, response time, and system stability. The purpose of the study that took place was to design the most appropriate controller for the steadiness of DC motors. Throughout this study, analytical means like tuning methods, loop control, and stability criteria were adopted. The reason for this was to suffice the preconditions and obligations. Furthermore, for the sake of verifying the legitimacy of the controller results, modelling by MATLAB and Simulink was practiced on every controller.
Volume: 6
Issue: 4
Page: 252-268
Publish at: 2017-12-01

Islanding Detection in a Distribution System with Modified DG Interface Controller

10.11591/ijape.v6.i3.pp133-141
Abbineni Sai Subhadra , P. Linga Reddy , Shailesh B. Modi
Islanding detection of Distributed Generation (DG) is considered as one of the most important aspects when interconnecting DGs to the distribution system. It was the crucial problem in distributed generation. This detection phenomenon having a great importance. These detection methods are divided into active and passive islanding detection. These two methods are based on changing in parameters such as frequency, voltage and current harmonics. But these methods have some challenges such as reduction in power quality and large Non Detection Zone (NDZ). In this paper, the proposed method is change of Total Harmonic Distortion (THD) will be studied for islanding detection diagnosis. The studied system was considered by following the standard IEEE-1547 and UL-1741. The system was simulated using MATLAB/ SIMULINK.
Volume: 6
Issue: 3
Page: 133-141
Publish at: 2017-12-01

Research Designs and Methods in Self-assessment Studies: A Content Analysis

10.11591/ijere.v6i4.8921
Serafina Pastore
This paper focuses on self-assessment practices in the higher education field. In the assessment for learning perspective, self-assessment is related to reflection, metacognition, and self-regulation: all these aspects are considered as fundamental prerequisites for students’ future professional development. Despite the recognition of self-assessment educational benefits and implications, research so far lags behind the rise in the rates of align literature review, research design, and methodology. The study attempts to address this gap in the literature. Based on a critical review of institutional changes in the European higher education context, the paper reflected on main issues and problems faced by educational research on self-assessment. It then tried to identify future research pathways on this topic.
Volume: 6
Issue: 4
Page: 257-264
Publish at: 2017-12-01

Customers’ Perception Towards Services of Telecommunications Operators

10.11591/ijict.v6i3.pp146-154
Driss Ait Omar , Mohamed Baslam , Mourad Nachaoui , And Mohamed Fakir
Currently the operators in the telecommunications market present offers of subscription to the consumers,and given that competition is strong in this area, most of these advertising offers are prepared to attract and / or keep customers.For this reason, customers face problems in choosing operators that meet their needs in terms of price, quality of service (QoS), etc..., while taking into account the margin between what is advertising and what is real. Therefore, we are led to solve a problem of decision support. Mathematical modeling of this problem led to the solution of an inverse problem. Specifi-cally, the inverse problem is to find the real Quality of Service (QoS) function knowing the theoretical QoS. To solve this problem we have reformulated in an optimization problem of minimizing the difference between the real quality of service (QoS) and theoretical (QoS). This model will help customers who seek to know the degree of sincerity of Their operators, as well as it is an opportunity for operators who want to maintain their resources so that they gain the trust of customers. The resulting optimization problem is solved using evolutionary algorithms. The numerical results showed the reliability and credibility of our inverse model and the performance and effectiveness of our approach.
Volume: 6
Issue: 3
Page: 146-154
Publish at: 2017-12-01

Execution Evaluation of End-to-end Security Conventions in an Internet of Things

10.11591/ijeecs.v8.i3.pp719-720
Sudha Mishra , A. Arivazhagan
Remote Sensor Networks are bound to assume a crucial part in the cutting edge Internet, which will be described by the Machine-to-Machine worldview, as indicated by which; installed gadgets will effectively trade data, therefore empowering the improvement of creative applications. It will add to declare the idea of Internet of Things, where end to-end security speaks to a key issue. In such setting, it is essential to comprehend which conventions can give the correct level of security without loading the restricted assets of compelled systems. This paper displays an execution examination between two of the most broadly utilized security conventions: IPSec and DTLS. We give the investigation of their effect on the assets of gadgets.
Volume: 8
Issue: 3
Page: 719-720
Publish at: 2017-12-01

Steady State and Transient Analysis of Grid Connected Doubly Fed Induction Generator Under Different Operating Conditions

10.11591/ijape.v6.i3.pp171-192
Sukhwinder Singh Dhillon , Jagdeep Singh Lather , Sanjay Marwaha
This paper present steady state and dynamic (Transient) models of the doubly fed induction generator connected to grid. The steady state model of the DFIAG (doubly fed asynchronous induction generator) has been constructed by referring all the rotor quantities to stator side. With the help of MATLAB programming simulation results are obtained to depict the steady state response of electromechanical torque, rotor speed, stator and rotor currents, stator and rotor fluxes, active and reactive drawn and delivered by Doubly Fed Asynchronous Induction Machine (DFAIM) as it is operating in two modes i.e. generator and motor. The mathematical steady state and transient model of the DFIAM is constructed for three basic reference frames such as rotor, stator and synchronously revolving reference frame using first order deferential equations. The effect of unsaturated and saturated resultant flux on the mutual inductance is also taken into account to deeply understand the dynamic response of the machine. The steady state and dynamic response of the DFAIG are compared for different rotor voltage magnitudes. Also, the effect of variations in mechanical input torque, stator voltage variations are simulated to predict the stator and rotor currents, active and reactive power, electromagnetic torque and rotor speed variations.
Volume: 6
Issue: 3
Page: 171-192
Publish at: 2017-12-01

Finding Knowledge from Indonesian Traditional Medicine using Semantic Web Rule Language

10.11591/ijece.v7i6.pp3674-3682
Ridowati Gunawan , Khabib Mustofa
One of the natural resources in Indonesia is a lot of plants which can be used in healing diseases. Thosekinds of plants can be used in “Jamu”. Jamu is a name given to traditional medicine in Indonesia. Usually Jamu is composed from several plants as ingredients. Particularly, some parts of the plant like the leaves, roots, or branches have different purpose in Jamu. Nowadays the knowledge about Jamu can be known by building Ontology. Ontology can be built and developed to enrich the content. Knowledge in Ontology is built by several rules using Semantic Web Rule Language (SWRL).Knowledge gained from SWRL is easily searchable so that users can double check the results obtained.
Volume: 7
Issue: 6
Page: 3674-3682
Publish at: 2017-12-01

Optimal Power Flow Based Economic Generation Scheduling in Day-ahead Power Market

10.11591/ijape.v6.i3.pp123-132
Kshitij Choudhary , Rahul Kumar , Dheeresh Upadhyay , Brijesh Singh
The present work deals with the economic rescheduling of the generation in an hour-ahead electricity market. The schedules of various generators in a power system have been optimizing according to active power demand bids by various load buses. In this work, various aspects of power system such as congestion management, voltage stabilization and loss minimization have also taken into consideration for the achievement of the goal. The Interior Point (IP) based Optimal Power Flow (OPF) methodology has been used to obtain the optimal generation schedule for economic system operation. The IP based OPF methodology has been tested on a modified IEEE-30 bus system. The obtained test results shows that not only the generation cost is reduced also the performance of power system has been improved using proposed methodology.
Volume: 6
Issue: 3
Page: 123-132
Publish at: 2017-12-01

Optimal Path Planning using Equilateral Spaces Oriented Visibility Graph Method

10.11591/ijece.v7i6.pp3046-3051
Nor Badariyah Abdul Latip , Rosli Omar , Sanjoy Kumar Debnath
Path planning has been an important aspect in the development of autonomous cars in which path planning is used to find a collision-free path for the car to traverse from a starting point Sp to a target point Tp. The main criteria for a good path planning algorithm include the capability of producing the shortest path with a low computation time. Low computation time makes the autonomous car able to re-plan a new collision-free path to avoid accident. However, the main problem with most path planning methods is their computation time increases as the number of obstacles in the environment increases. In this paper, an algorithm based on visibility graph (VG) is proposed. In the proposed algorithm, which is called Equilateral Space Oriented Visibility Graph (ESOVG), the number of obstacles considered for path planning is reduced by introducing a space in which the obstacles lie. This means the obstacles located outside the space are ignored for path planning. From simulation, the proposed algorithm has an improvement rate of up to 90% when compared to VG. This makes the algorithm is suitable to be applied in real-time and will greatly accelerate the development of autonomous cars in the near future.
Volume: 7
Issue: 6
Page: 3046-3051
Publish at: 2017-12-01
Show 1492 of 1983

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration